Skip to main content

2012 | Buch

Instrumentation, Measurement, Circuits and Systems

insite
SUCHEN

Über dieses Buch

The volume includes a set of selected papers extended and revised from the 2011 International Conference on Mechanical Engineering and Technology, held on London, UK, November 24-25, 2011.

Mechanical engineering technology is the application of physical principles and current technological developments to the creation of useful machinery and operation design. Technologies such as solid models may be used as the basis for finite element analysis (FEA) and / or computational fluid dynamics (CFD) of the design. Through the application of computer-aided manufacturing (CAM), the models may also be used directly by software to create "instructions" for the manufacture of objects represented by the models, through computer numerically controlled (CNC) machining or other automated processes, without the need for intermediate drawings.

This volume covers the subject areas of mechanical engineering and technology, and also covers interdisciplinary subject areas of computers, communications, control and automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the book and also find it stimulating in the process.

Inhaltsverzeichnis

Frontmatter
Range of Query Processing in Peer to Peer Networks

Peer to peer databases are becoming prevalent on the Internet for distribution and sharing of documents, applications, and other digital media. The problem of answering large-scale ad hoc analysis queries, such as aggregation queries, these databases poses unique challenges. Exact solutions can be time consuming and difficult to implement, given the distributed and dynamic nature of P2P databases. In this paper, we present novel sampling-based techniques for approximate answering of ad hoc aggregation queries in such databases. Computing a high-quality random sample of the database efficiently in the P2P environment is complicated due to several factors: the data is distributed across many peers, within each peer, the data is often highly correlated, and, moreover, even collecting a random sample of the peers is difficult to accomplish. To counter these problems, we have developed an adaptive two-phase sampling approach based on random walks of the P2P graph, as well as block-level sampling techniques. We present extensive experimental evaluations to demonstrate the feasibility of our proposed solution.

R. Saravanan, P. Vivekananth
A Scene Detection Based Scheme for Supporting VCR Functions

In a video streaming system, the VCR operations such as fast forward, fast backward etc, need more network bandwidth than the normal playback due to the transmitting of redundant frames. In this paper, a novel scene-detection scheme was proposed, and introduced to the implement method of fast forward operation. The scheme allocates bandwidth according to each scene’s length, and select frames in each scene to be displayed dynamically. Experimental results show that the scheme can implement the fast forward operation at a bandwidth which was allocated for the normal playback situation, meanwhile keep the frame rate in the range of 22 to 27 and the mean average activity greater than 95 percent until the speed factor 24.

Shu-bin Xu
Constructing Digital Campus Using Campus Smart Card System

Campus smart card system is basic supporting part in campus information constructions. It is one of the projects which can best reflect the effectiveness of campus information construction. It also plays a great role in improving school management and service. Campus smart card system is an integrated system of consumption and authentication. The systems collect a wealth of data. That everybody in the campus has a smart card extends the usefulness of smart card system. This paper describes the secondary developments and data mining based on campus smart card system in Beijing Jiaotong University. It lays emphasis on the design, function and implementation of Campus Personnel Data Center, Demission Procedure System, and Students Conducts Analyzing System.

Fang Wang, Zhuo-sheng Jia
Research about Pattern Matching Algorithm

Several algorithms including BM, BMG, AC and AC-BM are discussed and the running time of the algorithms are measured on the snort in the paper. The results show that AC and AC-BM are faster than BM and BMG on the large number of patterns, but on the small number of patterns we obtained the opposite result.

Minjie Wang, Lianxuan Zhu
Study of E-mail Filtering Based on Mutual Information Text Feature Selection Method

Aiming at the problem with filtering E-mail, based on analyzing defects of the traditional mutual information, an approach based on quadratic TF * IDF mutual information feature selection is presented in the paper; then the importance of characteristic words appearing just in only one class is again measured to solve the problem that feature selection is not effectively done because of equal mutual information value. Finally, Bayesian classifier is used for experiment and experimental result shows that compared with the original method, the presented approach possesses higher correct rate and more efficiency of classification in text classification.

Shangfu Gong, Xingyu Gong, Yuan Wang
Research on the Moving Vehicle Detection Algorithm Based on the Motion Vector

In this paper, moving object detection under the dynamic background in aerial videos has been studied, and a moving vehicle detection algorithm based on the motion vector is proposed, using the KLT algorithm for matching feature points, according to K-medoids clustering algorithm on the feature points, finally the location of the target vehicle has been found. Experiments show that the method in this article can accurately detect the moving vehicles in the aerial videos, and then extract the corresponding traffic information.

Jian Gong, Fuqiang Liu, Chunlin Song, Jianzhu Cui, Zhipeng Li
A Robust Blind Watermarking of Vector Map

A blind watermarking algorithm is proposed for copyright protection of vector map. The watermarking is embedded by changing the x/y-coordinates of vertices within the tolerance of the data. The experiments show that the algorithm is fairly good in imperceptibility and robustness against the following attacks: polyline simplifications, moving and cropping of vertices, and addition of small amounts of random noise, renewal operations (adding, deleting, modifying, etc.).

Lian-quan Min, Xian-zhen Zhu, Qiang Li
Implementation of Spectrum Sensing Based on Covariance in Cognitive Radio

Spectrum sensing is a fundamental problem in cognitive radio communication system. In this paper, the implementations of spectrum sensing based on the Covariance Absolute Value (CAV) on the test bed of cognitive radio system are presented. This demo cognitive radio system uses the spectrum holes which are determined by sensing for communication with the spectrum from 694MHz to 806MHz and can avoid impact immediately when detecting the primary users (no mater digital television or analog television) at working spectrum. The implementation further reduces the computational complexity and makes a great significance in practical applications. A series of tests show that the detection performance of Covariance Absolute Value is not liable to be affected by the noise uncertainty in practical application and meets the need of the system primly. Furthermore, the performances of detection are also verified with different kinds of source signals.

Hongyu Li, Yuchen Wang, Yading Chen, Shaoqian Li
Simulation and Analysis of Quiet DDOS Attacks

The Quiet DDoS attack was proposed in 2009 by Amey and Nirwan. It launches certain number of TCP flows to reduce the transferring ability of normal TCP flows by using botnet. By the simulation experiments on the NS2 platform, we analyze the factors and their impacts on the attack in detail. According to the results of simulation, we give some suggestion to counter the Quiet DDoS attack.

Jing Zhang, Bo Liu, Huaping Hu, Lin Chen, Tianzuo Wang
VV&A Resources Management System of Guidance Simulation

In order to heighten the automation degree of VV&A and the security of resource information, the effective management of VV&A resource is needed. In this paper, we firstly analyze the basic flow of lifecycle VV&A of guidance simulation system (GSS) and the related resources during every phase of VV&A. And then the model of VV&A resource will be established. In order to get effective management of VV&A resource, database of VV&A resource is developed based upon Oracle 10g DBMS. Finally VV&A resource management system is designed and realized.

Zhenjun Li, Peng Jiao
Web-Based Collaborative Construction of Curriculum Texts in Higher Education

This paper mainly discuss the relationship between four kinds of texts which proposed by Professor Zhong Qiquan and five curriculum forms which proposed by J. I. Goodlad, and propose four kind of method to the collaborative development of curriculum texts based on the case study. The collaborative construction mode include ready-made texts based on Wiki, teaching plan texts based on network teaching system, classroom texts based on online mind map website, and after-class texts based on blog.

Practice shows that, collaborative construction modes based on network can help complete curriculum texts construction in higher learning institution effectively, support curriculum teaching and learning activities, and improve teaching effect.

Wenxin Deng, Fang Lu
Study on LDPC Application in Wireless Communication System

Low-density-parity-check (LDPC) is linear group code with sparse check-up matrix. It not only has the good performance of approaching the Shannon limit, but also lowers decoding complexity and the structure is more flexible. This paper mainly focuses on LDPC whose length is 672 bit and rate is 2/3 in the IEEE802.16e standard, and completes LDPC simulation in wireless communication system using Matlab and Simulink. The conclusion shows that LDPC has good performance in a simulation atmosphere noise condition.

Li Wang, Tikui Wang, Jianqiang Guo, Jinlong Li, Xiaorong Gao
Coding of Magnetic Ruler in Cylinder

One of magnetic rod hydraulic cylinder displacement measurement system’s major techniques is to carry on “the rod” according to certain coding rule scoring, the good code not only need be advantageous to the recognition time the error detection or the error correction, moreover must be advantageous to the long traveling schedule survey time the symbol expansion, the immediate influence to the hydraulic cylinder piston displacement’s effective survey, this article has analyzed the magnetic rod code design fit and unfit quality weight target - - The average amount of information sources, the decoding error rate, error detection/error correction ability, has carried on the comparison based on the target to the existing magnetic rod code, had pointed out their good and bad points, provide the basis for the magnetic rod’s efficient coding.

Gengbiao Chen, Yang Yang
Edge Detection of Level Ruler with Digital Level

The digital level displacement surveys, the rod barcode image’s marginal check are affects its measuring accuracy the important link. According to the rod barcode image’s rectangular characteristic, proposed that uses based on the LOG operator zero crossing intersection examination algorithm, analyzed in the examination process to have “the false peripheral point” the question, gave three kinds to amend a plan, a plan use peripheral point’s first derivative was the extreme value characteristic, the plan two use peripheral point three step derivative non-vanishing characteristic, about the plan three use peripheral points the domain product non-characteristic. The experimental verification three methods have gone to “the false peripheral point” validity.

Gengbiao Chen, Caiyi Wang
New Approaches to Apply Multi-stereo Matching into 3DCG Modeling

We introduce stereo matching into three dimensional computer graphics (3DCG) modeling and expand one pair of stereo cameras to a camera network consists of a series of web cameras. We call our new approach multi-stereo matching. In this paper we present the stereo axes error correcting algorithm, approximate calculation of the stereo coefficient, and measurement method of multi-stereo. Finally we give our experimental results.

Ningping Sun, Hiroshi Nagaoka
Research on Sleep Mode in WANDAS

This paper investigates sleep mode of MS (Mobile Subscriber) at Power Saving Class I sleep mode based on WANDAS (Wireless Access Network for Distribution Automation System). Sleep mode is a key feature introduced in WiMAX standard, which ensures minimize the MS power consumption and decrease the occupation of interface resources in serving BS (Base Station). Firstly, we propose a sleep mode control algorithm based on WANDAS, which adjusts adaptively according to the traffic rate, and based on variable sleep interval energy improved mechanism. Then we compare the proposed algorithm with the standard algorithm under four actual models which we given in this paper. Furthermore, the simulation results of the proposed algorithm show that the performance of the proposed algorithm is better than the standard algorithm in energy saving.

Li Meng, Su Han, Kang Yu, Yun Chao
Design and Realization of Integrated Ultrasound Transmitting Circuit

The current ultrasound transmitting circuit has many disadvantages like large size, low digital standard, bad flexibility of adjustment and so on. A new integrated ultrasound transmitting circuit is developed. The circuit use DDS technique based on FPGA to control DC-DC boost circuit and pulse exciting circuit synchronously. Negative sharp pulses were generated which used to excite ultrasonic transducer. The results of experiment show that the transmitting circuit was stable and reliable. Compared with the current ultrasonic transmitting circuit, it has many advantages such as simple hardware structure, abundant digital port, strong expansibility and so on. And it can be adaptable to the demands of miniaturization and digitization for ultrasonic testing device.

Hao Liu, Changyun Miao, Yongmao Feng, Feng Rong
Special Way of Optical Communications the Technique of Superluminal Communications

We discussed new way—superluminal communication to enhance the information transmission capacity. Proved whether ug>c, or ug<0 the coded pulses keep in order as long as the observation outside the medium, In this paper we also responded the challenge facing to the superluminal transmission of information, in our opinion the predication of Einstein, no body (include information) can move faster than c, is wrong. In this paper we introduced our research result and some problems should be solved in future.

Zi Hua Zhang
Design and Process Simulation on High Voltage VDMOS

A VDMOS cell structure based on semiconductor physics and relevant states were designed. The process parameters of the high-voltage VDMOS have been calculated and ajusted. Using the optimal device’ dimensions, the doping concentration was ananlyzed systematically. Additionally, a simulating model of VDMOS was compiled based on SENTAURUS PROCESS. According to this model simulation, an optimized device parameters’ design was further determined. Finnally, the device drain-source breakdown voltage has satisfied a standard value of 1200V. Whereas its threshold voltage is 3.9V, which is in the prerequisite range of 3~ 5V.

Shouguo Zheng, Jian Zhang, Xinhua Zeng, Zelin Hu, Zede Zhu
Parameters Estimation of Stratospheric Airship and Model of Inflating and Deflating Air

Stratospheric airship is a complicated system. Parameters estimation and flight control are two important sides during the design of stratospheric airship. According to components of airship system, partial parameters were estimated from solar battery, propulsion system, buoyancy gas and so on, and a conceptual model of stratospheric airship was established. In accordance with the model established, based on the consistency of pressure difference between internal and external of stratospheric airship, a model of inflating and deflating air in the period of ascent and descent was established and simulated. The result indicates that the temperature of ballonet, the height and speed of flying have great influence to the velocity of inflating and deflating air.

Shaoxing Hu, Erbing Wu, Aiwu Zhang
A New Method for Improving Life Time in Wireless Sensor Network by Using Genetic Algorithm

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most survey subject have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on the network’s type and protocol’s operation also a fundamental issue in the design of Wireless Sensor Networks is to maximize their lifetimes particularly when they have a limited and non- substitute energy supply .To improve the network lifetime, controlling of power management and energy-efficient communication techniques at all sensors are necessary. In this paper, we propose a new method for the routing issue by using genetic algorithm for WSNs. Our purpose is to maximize the network lifetime by improving efficient routing techniques. Simulation results show that when we use good coefficient of our parameters, the life time of wireless sensor network is increased.

Shahram Babaie, Arash Khadem
Modern Education Technology and the Transformation of Teacher Role

The widely using of modern education technology is a very important sign about education modernization. It means not everything but lines with the modern understanding of education law, updates teaching models, contents, methods and etc, and the most important thing is that modern education technology will give a deep and wide impaction on traditional teacher role. The teacher can not be adapt to the need of the development of education in this information era if he can’t reaching the changing of his own role soon. So, teacher should seize the opportunity, discard the passed concept of education, hold the inner rules of education development and the characteristics of modern ear, set up righteous concept of education and talent, improve the information literacy and the capabilities of using modern education technology, strengthen the researching in education science. Only in this way can we meet the requirements of modern educational technology.

Canlong Wu, Shuying Zhan
Network Security Risk Assessment Model and Method Based on Situation Awareness and CORAS

Based on Network Security Situation Awareness framework, combined with DS Theory and CORAS, this paper proposes a Network Security Situation Awareness Risk Assessment Model. Then, we take Low Earth Orbit (LEO) Satellite Communications Network as an example to make a simulation and assessment. Through the experiment, the proposed model and method are verified to be valid.

Yong Qi, Yan Wang, Qianmu Li
Unit Transient Based Protection for High Voltage Wind Power Transmission Lines

Based on the wavelet transform results of the transient signals from all ends of the line, a unit protection for high voltage power transmission line is presented. The attenuation effects of high voltage transmission line and busbar capacitance to high-frequency current signals are analyzed. The Transient Current Content Ration(TCCR), Transient Voltage Content Ratio (TVCR) and Transient Voltage Singularity Ratio (TVSR) are deduced according to the analysis of the differences during high frequency voltage transients at each end of the transmission line when in-zone faulted and out-zone faulted. Protection criterion using TCCR and protection criterion using TVSR are proposed, and the principles of protection settings are given. The wavelet modulus maxima of transient signals are used to calculate TCCR and TVSR. Simulation experiments of different faults with EMTP are carried out to test and analyze the protection criteria. A 100kHz sampling rate is used in the simulation experiments. According to the simulation results, the protection criteria prove to be simple, reliable and good for whole line protection.

Mingchao Xia, Yong Lin, Edward W. C. Lo
Assessment of EXPO’s Impact on Regional Economy

The Expo is not only an festival about science, culture and history, but also an pivot economic event. The Expo works as a catalyst to the endemic economics perennially and profoundly as it will boost tourism, promote tertiary industry, attract investments and so on. Based on the statistical data about the beginning and mid-term, this paper use Grey Model, Entropy Method, Comprehensive quantitative analysis to simulate, predict and test the ending period data by computer softwares which make this model integrate.

Shiyun Yu, Hao Li
An Optimal Model for Repeater Coordination

Because of the limitation from line-of-sight transmission and reception, there is a necessity of repeaters to pick up weak signal, amplify them and retransmit them on a different frequency. However, two nearby repeaters interfere between each other when they transmit the signals in similar frequencies.

Our models find the minimum number of repeaters under certain limitations as the introduction mentioned in the paper.

We have made substantive conclusions by methods used as follows.

The Monte Carlo simulation has been perfectly” used in our models, and the simulation results are consistent with the result worked out from our model.

Uses several techniques while modeling such as” optimization and substitute thoughts in a complicated system.

We utilize simulation technique to test our model. It demonstrates that our method is robust.

Shiyun Yu, Hao Li
Copyright Self-registration and Its Secure Authentication Based on Digital Watermark

The copyright registration and authentication is an important task in copyright protection system for the digital work. The traditional centralized copyright registration and authentication system is less security and not fit for large quantities of digital work. In this paper, a novel copyright self-registration mode and authentication scheme is proposed for the copyright protection. In this scheme, a secure copyright protection authority and the copyright watermark of the owner are used. After described the architecture of the copyright protection authority, the secure copyright self-registration protocol based on the public elliptic curve and session key is proposed. Based on the proposed architecture and the copyright watermark, the owner identification protocol and the ownership verification protocol are all discussed in detail. After tested in the IPTV system and analyzed in the aspect of security, the proposed scheme and protocols are high performance and secure.

Jianbo Liu, Cheng Yang
A New Approach for SQL-Injection Detection

With the deepening of information construction, Web architecture is widely used in various business systems. While presenting convenience, these new technologies also introduce great security risks. Web security has been a serious issue of information security, and SQL-injection is one of the most common means of attack against Web services. SQL Injection often changes the structure of SQL statements. This paper proposed a self-learning approach to counter SQL Injection which can learn automatically the structure feature of all legal SQL statements to construct knowledge library based on SQL syntax tree in safe environments, and then match every SQL statement with knowledge library to find whether the structural feature has been changed in real environments. If successful, this SQL statement is legal. SQL statements which fail pattern marching are not determined as illegal immediately. Then, we take depth-feature check based on Value-at-Risk, and identity the true illegal SQL statements. This method which combines mode-matching and characterfiltering can reach good results. Experimental results prove that this proposed approach holds good performance and perfect protection for SQL Injection.

Cong-cong Shi, Tao Zhang, Yong Yu, Weimin Lin
Cloud Computing Concept in the Application of HIT Library

In this paper, our library based B/S model based on the library automation system, combined with cloud computing technology, analysis of cloud computing technology, application prospects in the library, as well as the library facing the management, data security, copyright, and other aspects of the challenges. We should take action to meet the new technological revolution has given us new opportunities and challenges.

Xiaodan Wang, Tingbo Fu, Guang Yu, Jiaomei Sun
Customer Segmentation and Marketing Strategy of Commercial Banks Based on CLV

Customer segmentation is one of the important research topics of customer relationship management. Through analysis of the information on retail customers, an evaluation indicators system is provided based on CLV. According to the customer segmentation of results, customer characteristics of each type and the corresponding customer marketing strategy are analyzed in detail, so as to provide support for the banks conducting objective evaluations and segmentations of retail customers’ value, promoting optimal allocation of resources.

Xia Wang, Lan Liu
Design and Implementation of Media Independent Handover on Heterogeneous Wireless Networks

Due to the great promotion of wireless network access technologies, users in different locations may be covered by different wireless access networks. It is more desirable to integrate heterogeneous access network technologies in multi-mode network devices for users. Te IEEE 802.21 working group defined a framework to provide The Media Independent Handover Functions (MIH Functions) to achieve handover with better performance. However, most implementations of IEEE 802.21 were based on mobile IP. The cost of implementation of IEEE 802.21 is high. In this project, we design and implement the MIH Functions by low-cost approach within Wi-Fi and Bluetooth. We can provide seamless handover to users such that user can switch access networks within Wi-Fi and Bluetooth with low cost.

Chang-Yi Kao, Chin-Shyurng Fahn, Jia-Liang Tsai
On-Line Detection and Evaluation of Cavitation in Large Kaplan Turbines Based on Sound Wave

The work is dedicated to the development of an on-line monitoring and analysis system of cavitation in large Kaplan turbines (TrbMAU) in order to evaluate the cavitation degree in real time. Sound wave emitted by cavitation is continuously monitored, including audible sound and ultrasound.

Considering the influence of the operating states of turbine-generator sets on cavitation, adaptive data acquisition (DAQ) and storage is proposed. The DAQ period and storage vary with operating states to capture all sound features in different operating states with less data redundancy.

Based on the real-time evaluation of the signal characteristics, such as standard deviation, noise level, and frequency compositions, the tendency of cavitation intensity with time and different operating states has been traced out. Furthermore, the integrated cavitation intensity will be estimated periodically, which can figure out the degree of cavitation erosion approximately. And the research methodology and pivotal concerns are discussed on the evaluation of the metal loss caused by cavitation.

The TrbMAU has been successfully put into service in Gezhouba Hydro Power Plant. Its performance has been proved to be very good.

Huixuan Shi, Xuezheng Chu, Zhaohui Li
Network Capacity Analysis for Survivable WDM Optical Networks

In this paper, a new architecture of optical networks-the server view based on optical networks is considered. New ILP formulations are proposed to analyze the network capacity with Network survivablity under the two types of node servers. Computer simulations are conducted to evaluate the effectiveness of these new formulations. The study has shown that the network can achieve the same throughput under the two types of node servers and the network throughput increases when the maximum allowed variation increases.

Zhenrong Zhang, Zhengbin Li, Yongqi He
Study on Traffic Information Dissemination Scheme in Transit of Highway Network

Traffic information’s effective dissemination can improve traffic operation condition of highway network, and expand its traffic capacity. From the angle of highway network, this paper studies on various ways to disseminate guidance information to traffic flow by roadside variable message board, highway advisory radio and intelligent terminal, and puts forward the setting principle and releasing content of them, which all will increase the timeliness, completeness and effectiveness of traffic information released.

Jun-jun Tang
Analysis and Emulation of a Layered Aggregation Method Based on Fair

In order to avoid affection of aggregation frequency and get delay guarantee, a layer-by-layer aggregation method based on fair is proposed. Gives complete theoretical analysis for this method. The experiment result based on NS2 shows that the method can provide the better delay performance.

Youjun Chen, Yunbing Zeng, Hongying He
MIP: A New Routing Metric for Wireless Mesh Networks

A new simple and effective routing metric called MIP (Metric of Interference and Propagation Delay) for multi-channel multi-radio wireless mesh networks (WMNs) has been proposed. The new metric combines loss rate, channel capacity, inter-flow interference and intra-flow interference together to find effective routing paths for source-destination pairs in WMNs. MIP is different from any existing routing metrics for wireless networks. It redefine Interference Ratio and tries to obtain balance between channel diversity and path length. Large numbers of experimental rounds prove that the new metric improves the performance of WMN a lot than existing algorithms.

Sufen Zhao
A Wireless Coordinating Scheme Proposed to Improve the Dispatching Security in China’s Railway System

In this paper, we proposed a wireless coordinating networking scheme along china’s high-speed railway. By combing GPS coordinating system with WIFI (802.11n) networking system, a relatively secured design for railway dispatching is structured.

Junfeng Lu, Wen-qiang Lu
The Prospects and Development on FTTH Technology in China

FTTH has become a new generation optical network access technology along with the popularity of the application of digital television, IPTV and other high bandwidth multimedia applications. This paper mainly introduces the several stages in the development of FTTH in China, several main technologies of FTTH, and the formulation of related international and domestic standards. Finally, it’ll discuss the prospects and development of next-generation FTTH technology.

Jin Cai, Zhiyong Tao, Huijuan Zhang, Lu Qin, Qian Mao
Cooperative Behavior in Evolutionary Snowdrift Game on a Growing Complex Network

In this paper, we study the evolutionary snowdrift game on a growing complex network with acceleratingly increasing number of nodes. In this growing network, the number of nodes added at each time step is a function

c

×

n

(

t

)

, where

n

(

t

)

is the number of nodes present at time t and c is a tunable parameter. The evolutionary SG plays with a preferential selection probability proportional to exp[(U

j

/

k

j

)*

A

] and a new strategy updating probability

H

i

 → 

j

 = 1/(1 + exp[(

U

i

/

k

i

 − 

U

j

/

k

j

)/

k

]) , where

U

i

denotes the total payoff of player i ,

k

i

denotes the degree of i, A and k are tunable parameters. It is shown that the cooperation frequency depends only on the payoff parameter r, it is much enhanced in the range of small payoff parameters, but descends straightly with the parameter r increasing, and it has nothing to do with the parameter c and A with this mechanism.

Qingke Zeng, Haiyong Yang, Hong Wang
Research and Implementation on a Collaborative Style of Test Bank System

To develop a collaborative item bank system and implementation methods used in data communications and data processing devices. The test bank system includes: database module, test module, communication module and access module. The implementation of the system includes the establishment of test database, paper library, the table of assessment and the table of features. Periodic testing and feedback results are required. Online communication and research discussions are required according to results based on feedback. Apply the implementation of characteristics and retrieval to the measured object Construct and use this system according to the characteristics of the object . The bank system and the implementation can help online team-based teaching model to guide the students to learning and formative assessment.

Yi-Bing Liu
Thermal Power Plant Pressure Dense Phase Pneumatic Ash PLC Control System Design and Implementation

Ash handling system of Coal-fired power plant is a advanced, economic, environmental science and technology. As the requirements and limitations of environmental protection, water resources and others, positive pressure pneumatic ash handling is widely used as ash handing method in China’s coal-fired power plant. In this paper, Changchun High-tech thermal power plant unit 2 25Mw Ash delivery system is taken as object describing the configuration and project delivery process of pneumatic ash handling system, according to the control performance requirements of the ash handling system unit designed to using Siemens S7-200 type PLC for the control core of dual- machine redundant automatic control system to achieve the ash system control requirements and the main function, while in the PC ,software Wincc6.2 used to control PLC running to achieve a successful running of equipment data collection, centralized operations, real-time monitoring, data storage, fault alarm functions , improving the system’s control and management capabilities. Reduced the labor intensity of running, saving the cost of maintenance.

Binlin Li, Wen You, Dianbin Song, Quan Tao
Communication Design for I2C Bus Based on Proteus

We introduce Proteus virtual development techniques into the microcontroller I2C bus communication designs, and take the AT24C02 for example to explain the Proteus simulation software and hardware design circuit of I2C bus communication. Then we analyse the hardware and software problem in Proteus debugging and provide the solution. The Simulation results which is identical with theoretical analysis prove that the correctness and the accuracy of Proteus virtual simulation. It has very important significance in the microcontroller virtual development.

Fengjie Wu, Liming Wu, Tangmei He
Application of Proteus in Microcontroller Comprehensive Design Projects

We introduce the simulation method of the Proteus software, and propose the virtual system design which based on the Proteus. Combining with the example of the smallest microcontroller system, we describe the specific application methods of the Proteus in experimental teaching. And finally, we achieve the soft parallel hardware co-development of the microcontroller comprehensive design projects, which can effectively save hardware resources and improve the development efficiency. It has very important significance in the microcontroller experimental teaching.

Fengjie Wu, Tangmei He
Modelling Three-Dimensional Foundation Pit Using Python Scripts

Accompanying with rapid development of city construction, there are more and deeper foundation pit projects in city centre, structure calculation of the foundation pit is of important significance. This paper uses a Python script to produce an input file which is compatible with the ABAQUS in order to make the foundation pit model easier and faster. And an engineering example is presented to prove the method feasible.

Shi-lun Feng, Yong Han, Pu-lin Li, Jun Li
The Research of the Cloud Security Architecture

A new solution of cloud security is proposed in this paper. It is used the security architecture of cloud computing based on symmetric encryption algorithm, combination key technology and encryption chip hardware. Compared with other cloud security solution, there are some advantages. The security level is higher. The security function is stronger. It is ensured the data is security and integrity transmission. It is guaranteed the security of program running and data storage of client. The real name and rapid login of user is realized, at the same time, the construction and maintenance costs of cloud security system are reduced.

Hu Xiangyi, Ma Zhanguo, Liu Yu
The Energy Harvesting Tipping Point for Wireless Sensor Applications

In recent years, energy harvesting technology has become more sophisticated and efficient, and energy storage technologies, such as supercapacitors and thin-film batteries (TFBs), have become more cost-effective. In addition, sophisticated low-power integrated circuits are now available to perform useful functions in energy harvesting applications, such as algorithmic control and wireless communications using tiny amounts of energy. We have now reached a technological tipping point that will result in the evolution of energy-harvesting-based systems from today’s niche products, such as calculators and wrist watches, to their widespread deployment in building automation, security systems, embedded controls, agriculture, infrastructure monitoring, asset management and medical monitoring systems.

The wireless sensor node is one of the most important product types poised for growth as an energy-harvesting solution. Wireless sensors are ubiquitous and attractive products to implement using harvested energy. Running mains power to wireless sensors is often neither possible nor convenient, and, since wireless sensor nodes are commonly placed in hard-to-reach locations, changing batteries regularly can be costly and inconvenient. This presentation will discuss how to implement wireless sensors powered by harvested energy coupled with ultra-low-power, single-chip wireless microcontrollers (MCUs) that use sophisticated power management techniques.

Alan Pang, Ross Bannatyne
Design of Broadband Optical Access Network Based on 10G-EPON

10G-EPON is the latest generation of access network technology, this paper describes the system structure and technical characteristics, analysis applications of 10G-EPON. A typical application environment as the background, given the overall solution 10G-EPON program, design and analysis of the FTTB + DSL access network architecture and optical power budget. It implemented smooth upgrade from 1G-EPON to 10G-EPON and with high feasibility and superiority.

Duo Peng, Jianbiao Wang
Comprehending Collective Wisdom in Hall for Workshop of Metasynthetic Engineering Based on Semantic Web

In 1992, Prof Qian Xue-sen put forward the relevant theoretical framework of the handling of the "open complex giant system", namely, Hall for Workshop of Metasynthetic Engineering (HWME). The system solves complex problems by fully inspiring collective wisdom. Meanwhile, the whole system consists of the expert system, the machine system and the knowledge system. Therefore, how to realize the mutual communication and understanding between man and man, man and equipment, and man and system is the key to stimulate collective wisdom. This paper presents a semantic network as a bridge for communication between those different parties; analyses understanding process of collective process based on the semantic network, studies the expression method of semantic web knowledge on services and role speaking and finally clarifies formation of consensus of discussion based on the semantic network.

Sao-qi Zhou, Ren Deng, You-hong Fan
A General Result on the Convergence of Online BP Learning

The backpropogation (BP) algorithm has been widely applied for training feedforward neural networks in scientific research and engineering. The success of the application, however, relies upon the convergence of the learning procedure. In this paper, we further analyze the convergence issue and provide a general result on convergence of the online BP learning algorithm. We prove that under mild conditions, the weight sequence defined by the learning procedure converges to a fixed value at which the error function attains its minimum.

Rui Zhang, Zuo-Zhi Liu
Research and Application of Data Synchronization Based on Group Communication Technology

To solve the problem of data consistency in distributed database system, this paper presents a global transaction-oriented synchronization model based on the features of total order service in group Communication. This model combines the transaction on each node with the technology of Atomic Broadcast and guarantees the data consistency of the system strictly. Results show that this model reduces the traffic of synchronization and improve the efficiency of eager replication.

Li-xin Li, Jue Wang
Kinetic Study of Vanadium-Oxides’ Magneto-sputter Deposition Based on Experimental Reaction Data

Based on a physical model, the growth rates and the transformation rates in the magneto-sputter process for V2O3, VO2 and V2O5 are obtained by fitting the experimental data. From these values one can see, under the conditions of the experiment in this article, the growth rate for VO2 is higher than that for V2O3 and V2O5 and the transformation rate for VO2 transforming to V2O5 is higher than that for V2O3 transforming to VO2. Also, in the view of the deposition time, in the beginning of deposition process, the percentage contents of each kind of vanadium-oxides change rapidly, and with the time growing, this change become gently. If both concerning the thickness of the deposited film and the percentage content of VO2, under the conditions of the experiment in this paper, the deposition time should be round 20 minutes.

Zheng Cui, Yu Lu, Zuochun Shen, Jianye Lu
Cost Forecast of Overhead Transmission Line Based on BP Neural Network

In order to make accurate and reasonable estimate of the overhead transmission line cost, which will become the basis for the establishment of project and cost, it is required to select an appropriate estimation method. Considering the traditional estimation methods’ shortcomings of higher subjective nature and low forecast accuracy, this paper is based on the BP neural network, making use of the computer resources and proposes a new method of estimation using the specifications and performance parameters of transmission lines as training samples. By comparing the predicted value and actual value, it demonstrates that BP neural network can accurately predict the cost of overhead transmission lines so that the workload can be greatly reduced.

Jun Zhou, Hanliang Wang, Yueguang Yang, Jiangjun Ruan
Dynamic Aggregation Method of Induction Motors Based on Coherent Characteristics

Parameters of induction motors have crucial effects on power system simulation. This paper proposes a dynamic aggregation method of induction motors. In this method, firstly, starting off the electromechanical models of induction motors, taking the coefficients of the electromechanical equations and steady slips of motors as the characteristic vectors, motors are grouped with C-means fuzzy clustering approach. Then, electro -mechanical equations of the equivalent motor is obtained by averaging that of the individual motors in the same group. Finally, parameters of equivalent motors are calculated based on the relationship of transient impedance before and after aggregation, and the principle that active and reactive power loads are equal before and after aggregation. Simulation results show that the proposed method can improve the precision of simulation.

Jun Zhou, Jian Zhang, Yueguang Yang, Yifeng Ju
Application of the Monopulse Tracking in Mimo Radar

MIMO Radar transmits the orthogonal signals, which results in the nondirectional of the pattern, the sum-difference beam can not be formed in radar receiver. In this paper, the azimuth and elevation sum-difference beam of the target corresponding to receiving station are formed using DBF(digital beam forming) technology, and range, the azimuth and elevation sum-difference beam of the target corresponding to transmitting station are formed using SIAR(synthetic impulse and aperture) technology. Therefore the error signal is formulated. And the tracking in MIMO radar is completed with a low computation complexity. The simulation results indicate the validity of the methods presented in this paper.

Guodong Qin, Baixiao Chen
A Class of Differential 4 Uniform Functions from Gold Functions

It is an interesting and challenging topic in cryptography to construct Boolean (or vector Boolean) functions with various of good cryptographic properties. In this paper, by analyzing of a class of linearized equations, we prove that the differential uniformity of the functions constructed by exchanging two values of the Gold functions is 4, and the derived functions also have high algebraic degree and high nonlinearity.

Dabin Zheng
The Stability of USO to Mars Orbiter Influence

The China’s first Mars orbiter "YingHuo-1" (YH-1) will be launched in the near future. To solve the tracking problem of Mars satellite, the kernel payload of Ultra Stable Oscillator (USO) of “YingHuo-1” is used for frequency standard, and the transmitter generates a standard downlink radio signal. The ground astronomical Very Long Baseline Interferometry (VLBI) system will be used to receive the radio signal. In this article, to investigate the mechanism of the tracking accuracy of the orbit detemination of YH-1, the experimental data of YingHuo-1’s USO was processed, using Solar-system Model and Orbit Determination (SMOD) software system developed at Xinjing Astronomical Observatory. The real-time precise orbit determination can be supported by the simulation experimental result, when the frequency stability of USO is about 10-12.

Zhen Wang, Kun Shang, Nan Ye, Na Wang, Jin Song Ping
Review of the Check Method in Metrology Support for Equipment

Control of the quality of test and calibration process by checking is one of the important aspects in equipment measurement support process. To ensure the quality of measuring result, appropriate check method should be select on the basis of the requirement of measurement support assignment and different check objects. In this paper, check methods are summarized systematically, check purpose are presented, as well as the meanings and implementation procedure of check methods.

Wei Jiang
Fuzzy Control of Denitrifying Phosphorus Removal via Nitrite

To establish an fuzzy control system of denitrifying phosphorus removal via nitrite, a sequencing batch reactor (SBR) with on-line monitors of pH was applied to wastewater treatment. The results indicated that denitrifying phosphorus removal via nitrite could be achived and inhibition of nitrite on phosphorus uptake could be avoid by step-feeding nitrite. During denitrification process pH increased with the decrease of nitrite, and the increase of pH was stopped after complete consumption of nitrite. So, an fuzzy control of denitrifying phosphorus removal via nitrite was established using pH as fuzzy control parameter. Further more, a novel two-sludge denitrifying phosphorus removal process was developed using above fuzzy control strategy.

Bin Ma, Yongzhen Peng, Shuying Wang, Qing Yang, Xiyao Li, Shujun Zhang
Application and Challenge of It Service Management to University Informatization

This paper conducts a planning and designing of the IT service management strategy, its process, and the corresponding organizations on the basis of university informatization, and in the end builds a full-life-cycle service management system for university informatization.

Hong Lin, Yajuan Sun
A Novel Method for Iris Recognition Based on Zero-Crossing Detection

As a kind of biometrics, iris recognition has been developed quickly in recent years. This paper studies a kind of iris identification algorithms which uses the longest-chord method for pupil localization and Hough transform for outer iris boundary location. Then the zero-crossing detection algorithm is used for iris feature extraction, and improved hamming distance is calculated for feature matching between templates of iris. Then, the influence of various parameters on the performance of the iris recognition program is studied deeply.

Li Yu, Xue Zhou
Fast Iris Location Based on Window Mapping Method

Iris recognition as one kinds of biometrics has become a hot research topic in recent years. As the first crucial step of iris recognition, the accuracy of iris location is very important for iris recognition. A novel iris localization method based on window mapping is presented here for iris segmentation: First, it searches the pupil center by window mapping, and then locates the pupil boundary. Finally, a fast and precise refinement of the outer boundary of iris is carried out based on an improved Hough transform method. Compared with conventional methods, this novel method shows faster and robust properties in locating the iris boundaries.

Li Yu, Xue Zhou
The Principles of Disk Taint Analysis of Temu and How to Write a Plugin

This paper introduces dynamic taint analysis and the architecture of TEMU, and then, analyzes and summarizes the procedure and key functions of disk taint analysis, furthermore, this paper gives a plugin about disk taint and gives experiment results which verify the feasibility of using TEMU to implement disk taint analysis.

Lanlan Qi, Jiangtao Wen, Bing Zhou, Yu Chen, Zhiyong Wu
Study for the Cooperation of Commercial Procedure Basing on Agent Technique

The work procedure and role in the commercial procedure are analyzed, Agent technique is brought into the commercial procedure through the analysis and study for it, the model for the element is established, and the cooperative setup structure for the system is built, the analysis for cooperation process basing on Agent is also given.

Shiyong Ding, Shuli Wang
An Analysis and Assessment Method of WCDMA Network Traffic

With the continuous expansion of network scale, how to balance the network quality and the construction cost has become the cruces which operators focus on. Accurately evaluating wireless network traffic and rationally deploying network resources is the key to solve the problems above.

This paper analyzes the features of the WCDMA network traffic, and puts forward a new assessment method of WCDMA network traffic as a reference for the rational network resources allocation.

Xinzhou Cheng, Jian Guan
Research on Embedded Parallel System Based on Ethernet

In order to overcome the drawbacks of fixed hardware structure, difficult software development, and poor versatility of a current Multi-DSP parallel system, this paper proposes an embedded parallel system based on Ethernet. The system uses standard DSP card as a parallel processing units, which are connected as a fast Ethernet by a switch, and achieve parallel processing under scheduling of a real-time operating system. After a preliminary evaluation, the system has advantage in good versatility, flexible configuration and high parallel efficiency. It will have a very high prospect in the field of measurement and control, communication and real-time simulation system.

Li Ying, Li Bo
A PMAC Motor Drive with a Minimum Number of Sensors

This paper proposes and implements a novel control technique for a PMAC motor drive with minimum a number of sensors. In the control scheme, the required three-phase voltages and currents are reconstructed from DC link measurements, and then the reconstructed voltages and currents are used to estimate rotor position with the robust position estimation algorithm. The estimated rotor position and the reconstructed phase currents can be used as feedback signals to implement the closed loop control in real time. The experiments demonstrate the feasibility of the implementation of the PMAC motor control with only two sensors and the motor drive has reasonable performances for some low cost applications.

Li Ying, Nesimi Ertugrul
The Integrated Concept of the Ground Segment for Space Internet

With the rapid development of internet and information technology as well as the increasing complexity of space missions, a strong demand to extend the internet to space and to establish an integrated space-ground network system came into being. To develop the cooperating capabilities of satellite-ground integrity and to improve the inter-operational capabilities of different systems of ground segment, the importance of integrated research for ground segment is presented in the paper firstly, then the integrated concept of the ground segment for space internet was proposed, and some key problems that needs to be solved are analyzed. Finally, suggestions are given regarding the steps of development.

Jian-ping Liu, Chun-yan Luo, Xiao-ying Li, Fan Yang
Related-Mode Attacks on PMAC

PMAC(Parallelizable Message Authentication), proposed by Black and Rogaway in Eurocrypt’02, is fully parallelizable block-cipher mode of operation for authentication. Under the traditional attack models, PMAC is provable security. This paper uses related-mode attack to analyse the security of PMAC, and points out PMAC is insecurity when we use a few block cipher modes of operate at the same time using the same key, and gives some results and some advices on how to use it.

Jin Xu, Qiaoyan Wen, Dayin Wang
Process Management of Civil Aircraft Development Project Based on Workflow

Beginning with the problems emerged in project implementation, the paper proposes a project process management solution based on workflow after analyzing the features and demands of process management in aircraft development projects. We use hierarchical network plan diagram to picture the running process of the project and put forward a kind of process model, process driving and monitoring techniques for civil aircraft project. Besides, we design a project management system based on the research and successfully apply it to i-Plane platform.

Zeng Yuqin, Yan Guangrong, Zhao Gang
JMF-Based Video Surveillance and Playback

In order to solve the complex installation and low security in video surveillance system, based on the Java Media Framework (JMF) Application Programming Interface and the real-time transport protocol RTP, a B/S mode video surveillance system under the internet environment is presented. The system framework, implement process and the solution to the key problem are also introduced in details. The system is not only highly safe and easy to use, but also meets the requirements of cooperation and surveillance in plants or R&D department within the development process of aircrafts.

Gao Xiuhui, Wang Wei, Zhao Gang
New Aspects of Phoneme Synthesis Based on Chaotic Modeling

The paper discusses the possibility of phonemes synthesis starting from a dynamic model based on chaotic modulation of the phoneme’s elementals. The natural phonemes can be analyzed in terms of elemental patterns that repeat themselves with slight chaotic variations along the signal length. The elementals are modeled by a classical harmonic modulation process having the parameters influenced by chaotic signals. The experimental results proved rather satisfactory and support further research in this direction.

Marius Crisan
Image Processing Scheme for Mobile Communication Equipment

In order to execute more sophisticated multimedia computing tasks, leverage potential computing resources, and execute tasks on external devices, a Mobile Peer-to-Peer (MP2P) framework is proposed in this paper. The MP2P framework technique is composed of group management technique, resource management technique, and pipe technique, and it could help mobile communication units sharing resource with greater efficiency and speed. The experimental results show that the services running on MP2P framework have better efficiency than on traditional client / server model framework. Since the nodes connected by left branch are better than right branch, the left branch provides a good means to get an optimal route for mobile communication units.

Ye Liang
Realization of a Multimedia Conferencing System Based on Campus Network

The multimedia conferencing system is a kind of multimedia communication system, which combines computer technology, communication & network technology, and micro-electronic technology. a multimedia conferencing system based on campus network is designed and realized In this essay. It can fully make use of the convenient educational resources in the campus network, overcome traditional difficulties through TV transmitting information and fulfill real time interactive meeting, teaching, multipoint communication, and at the same time records the meeting & teaching materials as courseware for replaying.

Wang Yun
Study on the Wireless Access Communication of Line Condition Monitoring System of Smart Transmission Grid

An extensive communication system is the essential infrastructure of the Smart Grid to ensure the information exchange and resource management rapidly and efficiently. Since it will affect all areas of power grid, from generation system to transmission and distribution system, the communication system will be hybrid and involve various communication technologies, such as optical transmission, wireless techniques, advanced sensor networks, etc. In this paper, we focus the discussion on the broadband wireless access techniques used for monitoring power transmission. We propose a hybrid wireless monitoring system based on WiFi and WiMAX to complete the dual direction communications for data collection and system controlling. The system design is introduced and the challenges for system implementation are discussed. Through our work, we wish to make contributions to China Smart Grid.

Jinghong Guo, Hao Zhang, Yaxing Liu, Hongbin Liu, Ping Wang
Forgery Attacks of a Threshold Signature Scheme with Fault-Tolerance

The threshold signature scheme with fault-tolerance is analyzed, and it is pointed out that the dishonest inside participants can forge the signatures of the authorized subset. An improved threshold signature scheme with fault-tolerance is proposed, and it is shown that the new scheme can resist insider forgery attacks effectively by analyzing the security of the improved scheme.

Yingda Yu, Chuanda Qi, Junjie He, Yuefen Chen
Performance Assessment and Detection of Instant Messaging Software Based on the AHP&LCA Model

Due to the rapid development of Internet, new forms of Internet based services appear, whose desktop clients are similar to traditional instant messaging software (IMS). In addition, because the IMS’s frequent updates and encryption of communication protocols, the traditional way of detecting IMS is not suitable anymore. So we promote a model combined with Analytic Hierarchy Process (AHP) and Life Cycle Assessment (LCA), to complete the performance assessment and detection of new forms of IMS and traditional ones, which based on advanced packet capture and analysis using Distribute Computing. The experimental results show that the performance of this method is effective and efficient. The most significant contribution of the AHP&LCA model in IMS is its flexibility which suits various needs. This paper provides a new thought of detecting of IMS.

ZongRen Liu, LeJun Chi
Chinese Accents Identification with Modified MFCC

It is well known that performance of Chinese speech recognition system fluctuates sharply with variation of accents. Hence it is feasible to identify accents before recognition. Based on our previous analysis [1], it is discovered that the first two formants are more sensitive to Chinese accents than others. A modified Mel-frequency cepstral coefficients (MFCC) algorithm is proposed by increasing the filter distribution in lower and middle frequency range to accommodate the sensitivity of Chinese accents. Comparing with the GMM system based on traditional MFCC, the error rate of the GMM system based on modified MFCC declines by 1.8%.

Qin Yan, Zhengjuan Zhou, Shan Li
A 24GHz Microstrip Array Antenna with Low Side Lobe

In this paper, a novel 24GHz 168-element microstrip array consisting of rectangular microstrip resonators is presented. Compared with the traditional 18×14 array, 84 elements may be reduced by keeping same performance. In order to obtain low side lobe, the feeding network with Dolph-Chebyshev distribution is used. And the design is confirmed by simulation and measured results.

Zhang Zhong-xiang, Chen Chang, Wu Xian-liang, Fu Ming-gang
Resources Allocation of Multi-project in Railway Construction

Owing to the amazing rise attention of the government has paid to the railway construction, and high-speed projects have been started in various places, the railway construction enterprises begin to focus more emphasis upon how to implement and balance multi-projects at the same time. On the other hand, these projects occupy the cherish resources and lead to competition. In this research, Genetic Algorithm (GA) is used to solve the allocation resources problem in order to achieve the shortest total duration. Finally, an example is as a proof to the conclusion.

Zhang Yunning, Jin Yao
The Research on Development Risk of Green Construction Material Based on Fuzzy Comprehensive Evaluation

In order to analyze and select the development project of green construction material more scientific and rational, the fuzzy comprehensive evaluation method in fuzzy set theory is introduced in this paper to evaluate development risk and establish comprehensive evaluation model for development risk of green construction material. This paper adopts risk priority number (RPN) which from failure mode effects and criticality analysis (FEMCA), to analyze the risk scale, set risk weight, and let this setting closer to actual condition, then calculating examples. At last we conclude that the method provides feasible analysis foundation, and has the strong practical value.

Zhang Yunning, Liu Gang
Design and Development of Provincial Master Station of Metering Automation System of Guangdong Power Grid

In recent years, Guangdong Power Grid Corporation has built the largest scale electric energy metering automation system in the country. The province’s 21 Power Supply Bureau have been building master metering automation systems. Because the data scattered in the 21 Power Supply Bureau’s master station, the data can not be the province’s electricity supply integrated display. There is an urgent need to construct a provincial master station, get the Power Supply Bureau’s master station data, process and integrated display the province-level data. In this paper, considering the actual situation of Guangdong Power Grid Corporation, we design and develop a Provincial master station of metering automation system of Guangdong Power Grid. We use advanced SOA and J2EE architecture, and apply a unified data format, get the power supply bureau’s master station data, calculate totals and overall show. After two years development and construction, Provincial Master Station of Metering Automation System of Guangdong Power Grid achieved good effect for the Guangdong Power Grid production and marketing business.

Yang Jinfeng, Chen Ruimin, Xiao Yong, Dang Sanlei, Wei Fusheng
The Research of Acceptance and Scheduling Scheme Based on the Overall Network QoS

Many factors affect the QoS of network, and the congestion control mechanism is the most important one. In many references, the research on QoS is focused on the specific network architecture, while the QoS of overall network is still relatively seldom studied. In the paper, an acceptance and scheduling scheme based on the overall network QoS (ASSoQoS) proposed is a new acceptance and scheduling algorithm of the link traffic. At first, the data stream with the admission control strategy will be distributed in different weights , the data flow will get the link (with different weight) transmission scheduling to improve the overall network QoS , according to the allocated weight of a network link and status by real-time network monitoring.

Xu Zhanyang, Huang Li Ping
Template-Based Image Composition on the iPhone

The Camera of mobile phone has become an important content source of photo-sharing social network site. In this paper, an image composition application on the iPhone mobile platform is presented. First, we design some templates of human body with various styles. Next, the user takes a photo or selects one from the photo library and composes it with one template via some gesture operations. Finally, the user can shake the iPhone, and then some animation effects may occur. The experimental results show the mobile application is full of fun.

Qingjie Sun, Wenjuan Chen, Lei Liu
Bag-of-Visual-Words Based Object Retrieval with E2LSH and Query Expansion

Boosted by the invention and wide popularity of SIFT image features and bag-of-visual-words (BoVW) image representation, object retrieval has progressed significantly in the past years and has already found deployment in real-life applications and products, but the traditional BoVW methods have several problems, such as:low time efficiency and large memory consumption, the synonymy and polysemy of visual words. In this article, a method based on E2LSH (Exact Euclidean Locality Sensitive Hashing) and query expansion is proposed. Firstly, E2LSH is used to hash local features of training dataset, and a group of scalable random visual vocabularies are constructed. Then, the visual vocabulary histograms and index files are created according to these random vocabularies. Finally, a query expansion strategy is used to accomplish object retrieval. Experimental results show that the accuracy of the novel method is substantially improved compared to the traditional methods, and it adapts large scale datasets well.

Zhao Yongwei, Li Bicheng, Gao Haolin
Online Learning Algorithm of Direct Support Vector Machine for Regression Based on Matrix Operation

With the development of support vector machine, its’ application of online learning was paid close attention to more and more. In this paper, we deduced an online learning algorithm for direct support vector machine (DSVM). By adding the bias square of hyperplane to the objective function, we introduced the mathematical mode of DSVM for regression which was extremely fast and simple, then we designed incremental and online learning algorithms by using the property of block matrix and kernel function matrix. Experimental results of simulation by using Mackey-Glass chaotic time series indicate the feasibility of the learning algorithm.

Junfei Li, Xiaomin Chen
Cable Geometric Modeling Technology in Virtual Environment

Cable is flexible object. Its deformation is defined by material properties, cross-section sizes and length conservation gravity and friction. So it consists of variable shapes. Cubic uniform B-Spline function is chosen as the mathematical model of cable centerline in this paper. Energy-Optimization method is used to search for the positions of the control points. Firstly, a suspending cable model with both ends fixed is established; Based on that, other cable models with the constraints of endpoint tangents or passing through given points are built up by Lagrange Multiplier method; Then the method named Same-Proportion Dichotomy is used to cope with the constraint of length conservation. Secondly, two kinds of cable models are established. One is with one end hanging in the air established by Gradient-Descent method, the other is with one end dragging on the ground by Gradient Projection Descent method. Because traditional virtual modeling technology mostly focused on rigid parts or small deformation components, these studies consist of important meaning for the farther development of virtual modeling technology.

Ma Long, Liu Pengyuan, Mi Shuangshan
Communication between Vehicle and Nomadic Device Used for Assistance and Automation

Introduction of wireless vehicular communications enables a variety of new Intelligent Transportation Systems (ITS) use-cases [1], [2], [3] allowing

cooperation

between vehicles and infrastructure services. Furthermore, modern vehicles feature an increasing number of driving

automation

functions. This paper identifies requirements of cooperative and automated ITS, with a special emphasis on

communication between a vehicle and a nomadic device

. An integrated ITS design is proposed by the German Aerospace Center (DLR) assembling

Vehicle Communications

,

Vehicle Technology

and

Infrastructure Technology

. This has been implemented in a prototype for evaluation in February 2011.

Daniel Thielen, Christian Harms, Tobias Lorenz, Frank Köster
Texture Synthesis Based on Wang Tiles

Texture Synthesis aims to solve the existing problem of seams in texture mapping. It is used to generate an arbitrarily large texture image given an existing small texture sample. For human observers, both the original texture image and the generated one are perceived as the same and the generated one does not contain obvious seams. Non-periodicity is an import principle in texture synthesis. Wang Tiles algorithm is known to synthesize texture according to a color matching rule via designing a Wang Tiles set. We believe if we utilize more tiles and the number of edges of each tile increases, that means, we use more colors, we can reduce periodicity in the synthesized results. The chosen texture tiles in the previous algorithms are mainly rectangular. Combined with Wang Tiles and Quilting algorithms, in this paper we design a hexagonal texture tile. Through the experiment our method is effective and not time-consuming.

Yan Liu, GuangLin Cheng
Research on the Control Strategy of the Driving System for a Kind of Hybrid Electric Vehicle

The features of driving system, the parameter matching and the control strategies of hybrid electric vehicle have determined the dynamic performance, the fuel economy, the emission characteristics, the manufacturing cost and the weight of the vehicle. In this paper, a kind of hybrid electric vehicle is considered as the research object and the control strategy of the driving system of this hybrid electric vehicle has been analyzed. Eventually, based on the parallel auxiliary driving, the system parameters have been selected according to the relevant system standards and the requirements for performance. At the same time, on account of the SOC torque balance control strategy, the simulation model of the whole system has been established by Matlab/Simulink. This simulation has verified the feasibility of the design and the effectiveness of the control strategies, which has achieved the desired goals. Compared with the traditional vehicles, this hybrid electric vehicle has improved the fuel economy and reduced the emissions.

Lu Fang, Wang Deng-feng, Li Da-peng
The Wireless Ranging System Based CSS Technology

This paper designs a wireless measuring system by the application of CSS technology and the use of NanoPAN5375 RF transceiver module and AVR mega1280 microcontroller, which achieves the long-distance, high-precision design requirements. Because the both ends can read data after the communication, this method can reduce much field work. By measuring the system has realized the technical program requirements, which has the features of low power, portable, anti-interference ability, and has a high value and market prospects in the actual production.

Sun Hao, Wang Xin, Lv Changzhi, Gong Weimin
Research on Communication Network of Smart Electricity Utilization for Residence Community

Optical Fiber Composite Low-voltage Cable can used to transfer energy, television, telephone and data(for internet) information, by this means, the communication network infrastructure could be built once a time and be shared by different service providers, so State Grid Company has regulated a series of standards on how to construct communication network for smart electricity utilization Residence community. The paper introduced the theories and key technology firstly, and then it illustrated a kind of solution on network and analyzed network security issues. At last it discussed the necessary policy support to further application.

Zhang Xin-lun, Wang Zhong-jian, Bu Xian-de, Zhu Yu-jia
Security Audit Based on Dynamic ACCESS CONTROL

The paper proposed a design of security audit based on dynamic access control, which periodically generated rules by mining latest log and applied rules to the packet filtering. Based on matching the content of packet with rules to measure network behavior security, this design generated different mechanism of security access control. Comparing to existing systems which made constant rules to respond to mutative filtering, this design had great applicability and flexibility.

Li Weiwei, Zhang Tao, Lin Weimin, Deng Song, Shi Jian, Wang Chen
A Study on Information Systems Risk Management Based on Control Self-assessment

CSA (Control Self Assessment) evaluation as a new control method, is widely used in domestic and This thesis, d. through the study of control self assessment method in information system under the environment of the critical success factors and implementation process, explore the control self assessment on the risk management of information system improvement and the promotion effect, and evaluate control self assessment information system impact of risk management.

Gengshen Yu, Xiaohuan Zhu
An Implementation of User Interaction Effect by Extending jQuery in Web Application

In this paper, we propose an implementation of user interaction effect of web application using jQuery. jQuery is a very popular and extensible JavaScript library. It is strong in controlling DOM(Document Object Model), events and Ajax. But, it is poor at advanced effect of web user UI(User Interface). Implementing advanced effects need to extend jQuery or some skills. So, our proposal is a good way to implement UI effects.

Seon Ung Lee, II-Young Moon
An Intelligent Agent-Based Framework for Information Security Management

Many organizations have introduced an Information Security Management System (ISMS) to improve their security information management. Contemporary management of information security involves various approaches, ranging from technology to organizational issues. According to international standard ISO/IEC 27001:2005, this paper presents an attempt to apply agent-based modeling to establish an information security management framework where machine learning technologies are incorporated. Within the framework, five types of agents are modeled in details. To foster the practical use of the framework in this paper, some critical issues are discussed.

Chengzhi Jiang, Bo Zhang, Yong Yu, Xiaojian Zhang
Effect of Atmospheric Turbulence Coherence Degradation on the Scintillation Index for a Partially Coherent Laser Beam

By using the theories of the mutual coherence function and the intensity scintillation of a laser beam propagating through turbulent atmosphere, the influence of light source partial coherence and the coherence degradation caused by turbulence on the scintillation index of a partially coherent laser beam are analyzed. The results show that atmospheric turbulence has a dual impact on the quality of a laser atmosphere communication channel. The intensity scintillation induced by turbulent atmosphere can increase the communication link bit error rate (BER), while the degeneration of coherence caused by atmospheric turbulence or adopting a partially coherent light source can decrease the BER within a certain distance range. Hence, the BER improvement by using a partially coherent laser as source may be restricted by turbulence coherence degradation for a laser atmosphere communication link.

Ruike Yang, Xiaoning Kang, Xiaobo Zhang
The Application of Mobile-Learning in Collaborative Problem-Based Learning Environments

This article describes the design and delivery of a history course in visit historical tourism guild at elementary schools in Taiwan. The course was devised and deployed to supplement learning activities in the traditional classroom. A series of quasi-experiments was conducted with innovative instructional designs, that is, collaborative problem-based learning (PBL) environment, and their combinations. The impacts of these problem-based learning pedagogies on students, instructors, and course design were evaluated. The effects of problem-based learning pedagogies were mostly positive, thus reinforcing the instructor’s confidence for further application to the rest of his courses. The authors further discuss the implications for schools, scholars, and teachers who plan to implement, or are already engaged in. In this study, the main goal was to improve students’ learning, explore the problem-based learning effects, refine the history course, and reinforce the teacher’s professional development. Therefore, mixed methods were applied. Specifically, the case study method was adopted to describe how students and the teacher adapted to the history course, and to detect deficiencies in design ideas and associated implementations for possible remedies in future trials. The authors intervened in students’ learning via different instructional designs and deployed quasi-experiments to explore the effects of the intervention. In this study that is PBL class as the first step in our analysis, we used movie of history which about historical tourism guild, and change the classroom to visit historical tourism guild. The instructor designed and explained questions before visit. We need to observe and record students’ behavior.

Chien Yun Dai, Tzu-Wei Chen, Dar-Chin Rau
Modeling Parallel MPI Programs in Petri Nets

The method of modeling concurrent programs is introduced. The basic framework of MPI programs are modeled by Petri net structures. On the one hand, the atomic actions of statements’ execution are represented by the transition firing, on the other hand, properties such as Orphan Message, Lack of Message, Deadlock and Livelock Subnet of concurrent programs are analyzed and verified.

Peng Zhang, Mei Qi
The Design and Implementation of the IDS Catalogue Data Archive System

Catalogue Data Archive System (CAS), as a background system, is the core part of the Internet Data Service system for Remote Sensing Data (IDS), which is a web portal published by CEODE and provides remote sensing data sharing and purchasing services. CAS integrates a series of updating methods and technologies, such as a suitable data transmittal mode, reflection, flexible configuration files and log information in order to make the system with several desirable characteristics, such as ease of maintenance, open and scalable, stability and minimal complexity. This paper describes the four major components of the CAS (Data Collector module, Metadata Convert module, Data Archive module and Data Inject module) and some of the unique features of the system, technical problems encountered and resolved.

Li Jingang, Liu Shibin, Liu Wei
Dem Generation with ALOS_PRISM Stereo Data for Zijinshan Diggings

Digital Elevation Model (DEM) generation is one of the most important products of optical image data processing. The Japanese optical sensor ALOS/PRISM which was launched in January 2006 has stereo capabilities which can be used for a great number of applications and products. A cloud-free ALOS_PRISM scene combination covering 35km x 35km Zijinshan diggings testfield has been analysed. It comprises the nadir and backward views with a base-to-height ratio of 1.0. The pixel size on the ground is 2.5m. The bundle orientation was executed with the related module of PCI Geomatica V10.3.2 software package and the RMSE(m) of 2.96 in X,1.59 in Y were achieved in planimetry. This level of accuracy can be provided using the number of GCPs up to 16 which are distributed over the scene uniformly. Based on the scene orientation, a DEM of the area has been determined by an automatic image matching and PCI system yielded a DEM with 5m cell size. For the validation of extracted DEM, a group of GCPs selected over the testfield were utilized. In this analysis, GCPs were collected by GPS survey. This was done by ARCGIS 9.1 and mean square differences was obtained in the range of 3.93 to 12.5m. Moreover, A comparison between the extracted DEM of PRISM and ASTER GDEM(NASA) by using profile plot was conducted. In view of the overall trend, the two different curves of DEM were coincident. But The peak value for curve of ALOS DEM is more sharp due to the accuracy of ALOS DEM is more higher. In addition, ALOS DEM fits better where the variation of elevation is small. And the difference is more obviously where the variation is large. The Finally, 3 D views was generated using matched DEM and LANDSAT TM colour composite image in Zijinshan diggings area without problem. This was extremely useful in visualizing different parts of the area from different directions. And this is also proved to be of great help in identifying the tectonic geomorphology of Zijinshan diggings.

Xiaomei Zhang, Guojin He, Chunxiang Chen
A Novel Smart Home System

Electronics such as air-conditioner, TV, humidifier, hi-fi equipment, can be called energy management systems implementing monitoring and statistics of energy data in the building. Their purpose is to make the relationship between power consumption and comfortable and healthy life environment more reasonable. In this paper, we present a novel smart home system integrating many kinds of energy efficiency features. This system is called VCE, which means making healthy life easier. VCE has many distributed low-power sensors in the environment which is used for detecting and better regulating human environment. These data are used for monitoring and analyzing real-time consumed energy on device level. VCE can adjust the temperature, humidity, light intensity volume and other information. And VCE can also detect human real-time vital signs like blood pressure, through sophisticated sensors.

Ligeng Yu, Xueen Li, Weijuan Han
Problem and Countermeasure on the Development of Mobile Electronic Commerce in China

Based on electronic commerce, mobile electronic commerce is a brand new method of business. It further transforms the means of exchange made by people in traditional business activities and has in-depth influence on the development of social economy. The article analyzes the current situation of the development of mobile electronic commerce in our country. It points out the problems faced by existing development of mobile electronic commerce in our country, including mobile payment, credit and law, and logistics, etc. The corresponding countermeasures are also put forward.

Jiangjing Wang, Jiulei Jiang, Feng He
Information Inquiry and Volume Analysis System on Urban Traffic Based on VB and MATLAB

In this paper, we carried out analysis, comparison, research on relevant technologies and methods, such as VB and MATLAB, and developed the information inquiry and volume analysis system. This system can realize: (1) inquiring the information of urban bus routes, stations, running schemes and the peculiar information of streets, (2) analyzing and forecasting traffic volume by Least Square Method (LSM) and Polynomial Fitting Method (PFM), and (3) qualitative analysis and quantitative analysis of the urban traffic faults.

Xiangcai Zhu, Yingkun Hou, Jian Xu, Yuncai Luan
Multivariate Analysis on System Reliability and Security

In order to ensure the reliability and security of electric power system, the faults must be removed exactly and quickly. The fault location method is one of key issues for the researches of electric power system. Extracting fault feature information from large amount of synchronized data will be a new challenge for locating of faulted components or faulted area. Multivariate analysis theory is superior in reducing dimensions and simplifying data structure featured without key information loss. In this paper, according to multivariate analysis theory, the reliability and security of complex power system has been accomplished.

Xiaoyan Wu, Zihui Che, Jing Jia
Design and Application of a Network Platform for Electronic Contract Making

Accompanying with the popularity of on-line business, e-business development in China has to break the bottleneck of traditional off-line mode. Therefore, seeking for a more economic, effective and efficient manner with security in contract making seems to be inevitable. The paper explains the status of current business negotiation, analyzes the difficulties in the popularizing of applying the electronic signature into commercial activities, and then raises the pioneer Network Platform for Electronic Contract Making as well as its applications. The study concentrates on the following highlights of the platform: firstly, the innovative application of electronic signature on contract making by integrating the digital signature technology into online negotiation and chatting system; secondly, realizing conservation of electronic contracts in an independent third party for future contract disputes; lastly, developing and forming a set of standard electronic contract templates in tree structures for the first time.

Yang Jianzheng, Xia Yunchao
Implementation of the Building Decoration Design Demonstration System Based on Virtual Reality

This paper established a demonstration system for building decoration design based on virtual reality, which uses the 3D modeling technology to construct the building scene, and the scene roaming technology to realize human-computer interaction. The system can dynamically follow the design progress and comprehensively display design efforts, so as to help designers discovering design problems in advance and avoiding the pitfalls.

Wu Feng, Wang Wei, Liu Xiuluo
Expanded Study on Criticality in Schedule Plan of Project

This article mainly concerns with resource-constrained schedule risk and comes up with a method which uses Genetic Algorithm to find out the shortest time of a project and bases on Monte Carlo Simulation to estimate schedule risk. First, a new concept of is proposed, which optimizes the resource constraints and epitomizes the law of diminishing marginal utility of resource. Second, introduce how to take advantage of Genetic Algorithm and Monte Carlo Simulation in schedule-risk-management. Finally, an example manifests that it is effectual of Monte Carlo Simulation to estimate schedule risk and assist decisions in project under resource-constrained circumstances.

Li Dayun, Guo Shu-hang
WCF Applications in RFID-Based Factory Logistics Management System

By studying the distributed environment of RFID-based factory logistics management system and aiming at meeting the requirements of its security and reliability, this paper proposes a specific WCF Service Application solution. With the application of the WCF service model to the RFID-based factory logistics management system, the interaction problems among the device management, transaction processing and data services are solved effectively and one well application effect is obtained. Besides, the usage of MVC architecture separates the implementation and presentation, provides data protection at the same time and greatly enhances the security and reliability of the system.

Zhang Jianqi, Li Changzheng, Bao Fumin
Research on Construction Method of Multimedia Semantic Model for Intangible Cultural Heritage

Considering that knowledge of intangible cultural heritage includes accumulated concealed experiences in the long term, it is difficult to completely represent the complex semantic relations among different knowledge in the form of text, graphics, images, video, 3D model, motion or other multimedia types. The digitized information of intangible cultural heritage is divided into three levels for researching the metadata structure of corresponding levels. Then multimedia semantic model of intangible cultural heritage is constructed by the establishment of metadata mapping and integration relationship based on CIDOC CRM. Finally, the semantic modeling of multimedia for intangible cultural heritage is verified to provide a solution for the integration of heterogeneous multimedia data by taking the Dragon Boat Festival as an example.

Guoxin Tan, Tinglei Hao, Shaoquan Liang, Zezhao Lin
Improved Photonic Crystal 90° Bends for Millimeter—Wave Transmission

Metallic waveguides are popular used in microwave and millimeter wave transmission, but they are not easy to bend. 2D metallic photonic crystal structures have broad band gap and can be bended easily. In this paper improved photonic crystal 90° bends with high transmission and broad bandwidth covering over 220GHz atmosphere windows are designed by optimizing structure on the bending corner, and the transmission spectrum of the bends are given.

Q. Z. Xue, S. J. Wang
Simulation of Algorithm of Binary Offset Carrier Signal

BOC (Binary Offset Carrier) modulation accommodates to the new requirement of satellite navigation development. It can improve the precision of the measurement and also possess the higher ability of anti-interference. This paper covers the studies on the theory and characteristic of BOC signal, on the frequency spectrum, power spectrum and autocorrelation of BOC modulation, on the principle of BOC acquisition, and on the principle of BOC tracking from the sight of carrier tracking and code tracking separately. The simulation results are shown such as BOC signal based on BOC modulation, the acquisition of BOC signal based on the method of parallel code phase search acquisition, both carrier tracking loop and bump-jump code tracking loop, and acquisition signal tracking based on the above two loops. Finally organizing and analyzing the acquired statistics are given.

Xu Jia, Bi Mingxue
The Performance Test Research for Application System of Internet of Things

With the development of application system of Internet of things, the testing requirements about the wireless sensing device are also on the rise. There are two testing requirements. One is the national requirements on spectrum management. In order to ensure the normal operation of the radio services, state must manage the various micro-power and short distance wireless devices. The other requirement is the users’ needs on the system performance. The user often requests the authoritative third party to test the wireless devices in order to obtain the evidence for the system designing and the hardware selection. Basing on the performance testing of the application system, the paper researched the test contents and methods of wireless sensing devices on Internet of things, which can ensure the development of IOT industry.

Song Qizhu, Ma Aiwen, Peng Xiao, Wang Junfeng, Zhang Junchi
The Selection of the Solar Battery Board Applied in New-Type Photovoltaic Generation Awnings

All awnings applied in civil buildings usually have two functions; one is to resist rain and the other is to shelter from sunshine. However, the new-type awnings have the third function. The extra function is PV power generation. As the shade surface of awnings, the type of solar battery board decides whether the new-type PV powered awnings possess the above-mentioned three functions, as well as is one of the keys to whether they are worth popularizing. This text focuses on the exploration and study on the selection of solar battery board when they are used as the materials of shade surface on awnings. Based on their three basic functions, via analyses and comparisons in translucency and PV transmission rate etc. It is put forward that using thin-film solar battery board as the adumbral material is the best choice.

Xu-ping Chen, De-min Xiong
Unbalanced Three-Phase Power Flow Calculation Based on Newton Method for Micro-Grid

Because of the connection of distributed generation to energy complementary micro-grid, there are multi-supplying points and loop net which have serious influence on electric network tide and voltage regulation. Based on the models of different distributed generation and energy storage elements in power flow calculation, an unbalanced three-phase power flow calculation based on Newton method for micro-grid is presented, in view of three-phase unbalance and loop net of the micro-grid. The conventional steps of forming the Jacobian matrix, LU factorization and forward/back substitution in Newton method are replaced by back/forward sweeps on radial feeders with equivalent impedances, so that the calculation speed is proved. The example proved that the proposed method is efficient and feasible.

Jiang Guixiu, Shu Jie, Wu Zhifeng, Zhang Xianyong
Research of the Design of a Scene Simulation General Framework

Aiming at the issue that occurs many repeated work when developing scene simulation system, proposed a method of the scene simulation general framework design, and designed the framework including scene edit, scenario parse, initial configure, model drive and viewpoint control; aiming at the demand of the componentization of the entities in the scene simulation, proposed a method of component-based 3D entities modeling, and realized the dynamic loading and special driving of each component by the technology called configuration table and memory mapping. Through the development and application of a typical surface warfare scene simulation system, proved the practicability of the general framework.

Yao Linhai, Kang Fengju, Han Hong
Research on the Prediction of Web Application System Aging Trend Oriented to User Access Intention

The phenomenon of software ageing is very common with the increasing complexity of computer application system. In order to execute the software regeneration better and confirm the optimal time for software regeneration, this thesis puts forward a user access intention- oriented aging prediction method of web system. This method regards the user load as the research object, and indirectly predicts software aging by predicting the user access intention. The experimental results show that this strategy has good usability and validity, and it can predict the user follow-up visit sequence exactly. This method also laid a foundation for further execution of software regeneration.

Jun Guo, Hao Huang, Bo Wang, Yunsheng Wang
The Dynamic Control of the Process Parameters of MAG

Based on the comprehensive analysis of welding circuit for MAG (

Metal Active-Gas welding

) arc power, a system model, through power, cable, wire, droplet and arc, is found, and a voltage function of wire is also developed according to distributed temperature function about a variable of GLW (Genuine Length of Wire). Then, a dynamic and multicycle droplet-voltage mathematic model is also found by the TWC (time-weight coefficient)

φ

for the equivalent length of transferred droplet and by the transition of wire volume from a solid to a liquid state. Besides these, a arc-voltage function, involved the welding current, the GLW and the height of welding nozzle, is established logically and especially, Meanwhile, the correlative parameters is experimentally analyzed. At last, there made some acute and good dynamic control models of the process parameters of MAG on series of experiments in the paper.

Chuntian Li, Changhua Du, Huibin Xu, Yi Luo
Analysis of Occupational Accidents during Construction of Buildings Using Classification and Regression Tree

There is a higher rate of occupational accidents during the construction of buildings than most other industries on average. However, steps can be taken to reduce worker risk through effective injury prevention strategies. In this article, classification and regression tree (CART) is employed in identifying the characteristics of occupational injuries in the construction industry. Accident reports during the period 2000 to 2009 are extracted from case reports of the Northern Region Inspection Office of the Council of Labor Affairs of Taiwan. The results show that CART can indicate some patterns of occupational injuries in the construction industry. Proposed inspection plans should be in accordance with the cause of injury and the high-risk subgroup. The findings identified in this article provide a direction for more effective inspection strategies and injury prevention programs.

Chia-Wen Liao
Weapons Program Based on an Integrated Management Model of the Hall

With the progress of weapons programs, project objectives, planning, control and management of the main targets have also changed, such as information exchange projects in the participating units close enough to some extent, project management is characterized by a certain degree of non-continuous and mutual independence. The large-scale weapons program trend has led to a long-term development projects, including users of the participating units, including units in the project implementation process needs, functions and roles change. In order to maximize project management efficiency, to build a weapons system on the Hall project life-cycle concept of integrated management model, the completion of the project, including weapons, decision-making stage, design stage, production stage and equipment, process analysis phase of integrated management, forming a weapons project integration management organizational structure. Hall-based weapons system integration project life-cycle management to help solve a class of high-investment, high-interest, long-period large-scale project management issues.

Yongtao Yu, Ying Ding
Opinion Search and Opinion Mining: A New Type of Information Technology Bringing about New Scientific and Talent Revolution

The application of opinion retrieval and opinion mining in scientific research and academic appraisal would strongly promote the popularization of opinion search and conclusion search. They would significantly reduce research costs arising from repetitive researches and covert repetitive researches. Thereby, the output-input ratio of research costs would improve significantly, and the resource allocation would be optimized. Accordingly, experts of opinion retrieval and opinion mining need to conduct and prepare for related researches. The application of these new information technologies would also bring about a series of revolution in scientific research and academic appraisal, triggering scientific and talent revolution.

Liu Yidong
Backmatter
Metadaten
Titel
Instrumentation, Measurement, Circuits and Systems
herausgegeben von
Tianbiao Zhang
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-27334-6
Print ISBN
978-3-642-27333-9
DOI
https://doi.org/10.1007/978-3-642-27334-6

Premium Partner